Round-robin differential-phase-shift quantum key distribution with a passive decoy state method

Recently, a new type of protocol named Round-robin differential-phase-shift quantum key distribution (RRDPS QKD) was proposed, where the security can be guaranteed without monitoring conventional signal disturbances. The active decoy state method can be used in this protocol to overcome the imperfections of the source. But, it may lead to side channel attacks and break the security of QKD systems. In this paper, we apply the passive decoy state method to the RRDPS QKD protocol. Not only can the more environment disturbance be tolerated, but in addition it can overcome side channel attacks on the sources. Importantly, we derive a new key generation rate formula for our RRDPS protocol using passive decoy states and enhance the key generation rate. We also compare the performance of our RRDPS QKD to that using the active decoy state method and the original RRDPS QKD without any decoy states. From numerical simulations, the performance improvement of the RRDPS QKD by our new method can be seen.

[1]  XiaoYuan ZhenZhang,et al.  Practical round-robin differential-phase-shift quantum key distribution , 2017 .

[2]  Kai Wen,et al.  Unconditional security of single-photon differential phase shift quantum key distribution. , 2008, Physical review letters.

[3]  Hiroki Takesue,et al.  Differential-phase-shift quantum key distribution , 2009, 2006 Digest of the LEOS Summer Topical Meetings.

[4]  Fei Gao,et al.  Finite-key analysis for quantum key distribution with decoy states , 2011, Quantum Inf. Comput..

[5]  Shuang Wang,et al.  Experimental demonstration of a quantum key distribution without signal disturbance monitoring , 2015, Nature Photonics.

[6]  D. Bruß Optimal Eavesdropping in Quantum Cryptography with Six States , 1998, quant-ph/9805019.

[7]  T. Moroder,et al.  Passive decoy-state quantum key distribution with practical light sources , 2009, 0911.2815.

[8]  Nicolas Gisin,et al.  Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulse implementations. , 2004, Physical review letters.

[9]  Won-Young Hwang Quantum key distribution with high loss: toward global secure communication. , 2003, Physical review letters.

[10]  Yoshihisa Yamamoto,et al.  Practical quantum key distribution protocol without monitoring signal disturbance , 2014, Nature.

[11]  A R Dixon,et al.  Field test of quantum key distribution in the Tokyo QKD Network. , 2011, Optics express.

[12]  Zhu Cao,et al.  Experimental passive round-robin differential phase-shift quantum key distribution. , 2015, Physical review letters.

[13]  Gilles Brassard,et al.  Quantum Cryptography , 2005, Encyclopedia of Cryptography and Security.

[14]  Andrew J. Shields,et al.  Key to the quantum industry , 2007 .

[15]  Ting-Ting Song,et al.  Finite-key security analyses on passive decoy-state QKD protocols with different unstable sources , 2015, Scientific Reports.

[16]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[17]  Sanders,et al.  Limitations on practical quantum cryptography , 2000, Physical review letters.

[18]  H. Lo,et al.  Unconditionally secure key distillation from multiphotons , 2004, quant-ph/0412035.

[19]  Masato Koashi,et al.  Unconditionally secure key distribution based on two nonorthogonal states. , 2003, Physical review letters.

[20]  Wan-Su Bao,et al.  Practical round-robin differential phase-shift quantum key distribution. , 2016, Optics express.

[21]  T. Moroder,et al.  Non-Poissonian statistics from Poissonian light sources with application to passive decoy state quantum key distribution. , 2009, Optics letters.

[22]  H. Lo,et al.  Practical Decoy State for Quantum Key Distribution , 2005, quant-ph/0503005.

[23]  C. Silberhorn,et al.  Quantum key distribution with passive decoy state selection , 2007 .

[24]  Chun-Yan Li,et al.  Practical decoy-state measurement-device-independent quantum key distribution , 2013, 1305.7396.

[25]  Sellami Ali,et al.  DECOY STATE QUANTUM KEY DISTRIBUTION , 2010 .

[26]  Marco Tomamichel,et al.  Tight finite-key analysis for quantum cryptography , 2011, Nature Communications.

[27]  Masato Koashi,et al.  Simple and efficient quantum key distribution with parametric down-conversion. , 2007, Physical review letters.

[28]  Gilles Brassard,et al.  Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..

[29]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[30]  Masato Koashi,et al.  Experimental quantum key distribution without monitoring signal disturbance , 2015, Nature Photonics.

[31]  Xiang‐Bin Wang,et al.  Beating the PNS attack in practical quantum cryptography , 2004 .

[32]  Lo,et al.  Unconditional security of quantum key distribution over arbitrarily long distances , 1999, Science.

[33]  Wei Chen,et al.  Experimental round-robin differential phase-shift quantum key distribution , 2015, 1505.08142.

[34]  John Preskill,et al.  Security of quantum key distribution with imperfect devices , 2002, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[35]  Shor,et al.  Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.

[36]  Charles H. Bennett,et al.  WITHDRAWN: Quantum cryptography: Public key distribution and coin tossing , 2011 .

[37]  Josef Pieprzyk,et al.  Round-robin-differential-phase-shift quantum key distribution based on wavelength division multiplexing , 2018, Laser Physics Letters.

[38]  Nobuyuki Imoto,et al.  Robustness of the round-robin differential-phase-shift quantum-key-distribution protocol against source flaws , 2015 .

[39]  J-C Boileau,et al.  Unconditional security of a three state quantum key distribution protocol. , 2004, Physical review letters.

[40]  Chun-Yan Li,et al.  Wavelength-selected photon-number-splitting attack against plug-and-play quantum key distribution systems with decoy states , 2012 .

[41]  Qiaoyan Wen,et al.  Eavesdropping on secure deterministic communication with qubits through photon-number-splitting attacks , 2009 .

[42]  H. Lo,et al.  Quantum key distribution with triggering parametric down-conversion sources , 2008, 0803.2543.